@maxim_mazurok/gapi.client.sqladmin-v1beta4 0.0.20240709 → 0.0.20240724

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/index.d.ts +13 -3
  2. package/package.json +1 -1
  3. package/readme.md +2 -2
package/index.d.ts CHANGED
@@ -9,7 +9,7 @@
9
9
  // This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
10
10
  // In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
11
11
  // Generated from: https://sqladmin.googleapis.com/$discovery/rest?version=v1beta4
12
- // Revision: 20240709
12
+ // Revision: 20240724
13
13
 
14
14
  /// <reference types="gapi.client" />
15
15
 
@@ -131,6 +131,8 @@ declare namespace gapi.client {
131
131
  kind?: string;
132
132
  /** Location of the backups. */
133
133
  location?: string;
134
+ /** Output only. The maximum chargeable bytes for the backup. */
135
+ maxChargeableBytes?: string;
134
136
  /** The URI of this resource. */
135
137
  selfLink?: string;
136
138
  /** The time the backup operation actually started in UTC timezone in [RFC 3339](https://tools.ietf.org/html/rfc3339) format, for example `2012-11-15T16:19:00.094Z`. */
@@ -195,6 +197,8 @@ declare namespace gapi.client {
195
197
  region?: string;
196
198
  /** SSL configuration. */
197
199
  serverCaCert?: SslCert;
200
+ /** Specify what type of CA is used for the server certificate. */
201
+ serverCaMode?: string;
198
202
  }
199
203
  interface Database {
200
204
  /** The Cloud SQL charset value. */
@@ -291,6 +295,8 @@ declare namespace gapi.client {
291
295
  replicationCluster?: ReplicationCluster;
292
296
  /** Initial root password. Use only on creation. You must set root passwords before you can connect to PostgreSQL instances. */
293
297
  rootPassword?: string;
298
+ /** Output only. This status indicates whether the instance satisfies PZI. The status is reserved for future use. */
299
+ satisfiesPzi?: boolean;
294
300
  /** This status indicates whether the instance satisfies PZS. The status is reserved for future use. */
295
301
  satisfiesPzs?: boolean;
296
302
  /** The start time of any upcoming scheduled maintenance for this instance. */
@@ -311,6 +317,8 @@ declare namespace gapi.client {
311
317
  state?: string;
312
318
  /** If the instance state is SUSPENDED, the reason for the suspension. */
313
319
  suspensionReason?: string[];
320
+ /** Input only. Whether Cloud SQL is enabled to switch storing point-in-time recovery log files from a data disk to Cloud Storage. */
321
+ switchTransactionLogsToCloudStorageEnabled?: boolean;
314
322
  /** Output only. All database versions that are available for upgrade. */
315
323
  upgradableDatabaseVersions?: AvailableDatabaseVersion[];
316
324
  /** Output only. The dns name of the primary instance in a replication group. */
@@ -668,6 +676,8 @@ declare namespace gapi.client {
668
676
  pscConfig?: PscConfig;
669
677
  /** Use `ssl_mode` instead. Whether SSL/TLS connections over IP are enforced. If set to false, then allow both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the client certificate won't be verified. If set to true, then only allow connections encrypted with SSL/TLS and with valid client certificates. If you want to enforce SSL/TLS without enforcing the requirement for valid client certificates, then use the `ssl_mode` flag instead of the legacy `require_ssl` flag. */
670
678
  requireSsl?: boolean;
679
+ /** Specify what type of CA is used for the server certificate. */
680
+ serverCaMode?: string;
671
681
  /** Specify how SSL/TLS is enforced in database connections. If you must use the `require_ssl` flag for backward compatibility, then only the following value pairs are valid: For PostgreSQL and MySQL: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` For SQL Server: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=true` The value of `ssl_mode` has priority over the value of `require_ssl`. For example, for the pair `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false`, `ssl_mode=ENCRYPTED_ONLY` means accept only SSL connections, while `require_ssl=false` means accept both non-SSL and SSL connections. In this case, MySQL and PostgreSQL databases respect `ssl_mode` and accepts only SSL connections. */
672
682
  sslMode?: string;
673
683
  }
@@ -1834,7 +1844,7 @@ declare namespace gapi.client {
1834
1844
  },
1835
1845
  body: InstancesAcquireSsrsLeaseRequest
1836
1846
  ): Request<SqlInstancesAcquireSsrsLeaseResponse>;
1837
- /** Add a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. */
1847
+ /** Add a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use AddServerCertificate to add a new server certificate. */
1838
1848
  addServerCa(request?: {
1839
1849
  /** V1 error format. */
1840
1850
  '$.xgafv'?: string;
@@ -2717,7 +2727,7 @@ declare namespace gapi.client {
2717
2727
  },
2718
2728
  body: InstancesRestoreBackupRequest
2719
2729
  ): Request<Operation>;
2720
- /** Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. */
2730
+ /** Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use RotateServerCertificate to rotate the server certificate. */
2721
2731
  rotateServerCa(request: {
2722
2732
  /** V1 error format. */
2723
2733
  '$.xgafv'?: string;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@maxim_mazurok/gapi.client.sqladmin-v1beta4",
3
- "version": "0.0.20240709",
3
+ "version": "0.0.20240724",
4
4
  "description": "TypeScript typings for Cloud SQL Admin API v1beta4",
5
5
  "repository": {
6
6
  "type": "git",
package/readme.md CHANGED
@@ -185,7 +185,7 @@ await gapi.client.sql.instances.acquireSsrsLease({
185
185
  });
186
186
 
187
187
  /*
188
- Add a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in.
188
+ Add a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use AddServerCertificate to add a new server certificate.
189
189
  */
190
190
  await gapi.client.sql.instances.addServerCa({
191
191
  instance: 'instance',
@@ -328,7 +328,7 @@ await gapi.client.sql.instances.restoreBackup({
328
328
  });
329
329
 
330
330
  /*
331
- Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method.
331
+ Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use RotateServerCertificate to rotate the server certificate.
332
332
  */
333
333
  await gapi.client.sql.instances.rotateServerCa({
334
334
  instance: 'instance',